SlideShare a Scribd company logo
MARTIN BIOH RES-531 PROF. DOUGH EARHART SECURITY ISSUES THAT AFFECT CLOUD COMPUTING DATA STORAGE
SECURITY PROBLEM WITH CLOUD COMPUTING   What is cloud computing in the first place?   Cloud Computing is a metaphor for the internet “the Cloud”, Cloud computing is virtual servers available over the internet  Cloud computing is also known as  SaaS  (Software as a Service).
Problems with Cloud Computing Storage How do companies make informed decisions about data storage in the cloud?  How do companies protect the privacy of the stored data in the cloud? How is compliance and quality controlled in the cloud?
Purpose of My Research The purpose of this research is to examine the basic security protection method, compliance and how companies can make informed decisions and determine whether data stored in the cloud have sufficient privacy protection for customers and meet technical and regulatory issues.
What Companies needs to know Before saving in the Cloud What service are we contracting for and what are the vendor’s records management and compliance obligations? How is information destroyed? What are the vendor’s policies for backups, replication, or failover? What is the provider’s internal audit process? Is the vendor open to being audited for compliance?
Recommendations to Consider Before  any companies contract a Cloud provider   How secure is the solution you're considering  Is your data available from anywhere so that you can use it as a means of disaster recovery? Does the provider have a disaster recovery plan of its own?
CONT’ 5 Are there limits on the scalability? What happens if you grow beyond what you originally planned and contracted for?” Does the provider have a track record and enough customers to be considered stable?  Is the provider's storage located in a real data center?
Privacy and Security First among cloud computing data storage issues is security and privacy  In fact, a Software as a Services (SaaS) provider may be relying on other external providers for its backbone, infrastructure, and data storage.
Compliance Cloud computing storage places business data into the hands of an outside provider, cloud computing makes regulatory compliance inherently riskier and more complex than it is when systems are maintained in-house. Loss of direct oversight means that the client company must verify that the service provider is working to ensure that data security and integrity are ironclad.
Compliance Cloud compliance is difficult because you do not know where you data are located. Not only does an organization not know what is being done with its data, it may not even know who the providers are. Cloud computing models ignore these problems and make compliance and verification of compliance difficult, if not impossible.
Conclusion Cloud computing storage has become a hot term in the last few years, but a clear description of what it is, what it can do, and why companies might use it is often difficult to find  Cloud computing storage may not be suitable for all businesses. Security/privacy and Compliance are a major concern.
Cont’ Conclusion Cloud computing storage may be affordable and suitable for small businesses but certainly can not replace the traditional way of storing customer data.

More Related Content

PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
Data storage security in cloud computing
PPTX
Ensuring data storage security in cloud computing
PPTX
Data security in cloud computing
PDF
Data protection in cloud computing - Data Protection Conference 2011
PPTX
Ryan_Holt_MS_Thesis_Project_Presentation
PPTX
Security issues in cloud database
PPTX
Data Integrity proofs in cloud storage
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
Data storage security in cloud computing
Ensuring data storage security in cloud computing
Data security in cloud computing
Data protection in cloud computing - Data Protection Conference 2011
Ryan_Holt_MS_Thesis_Project_Presentation
Security issues in cloud database
Data Integrity proofs in cloud storage

What's hot (20)

PPTX
Data security using rsa
PPTX
Ensuring data security in cloud computing. - Anusha Tuke
PPTX
Ensuring data integrity on cloud data storage
PPTX
Security in cloud computing
PPT
Data security in the cloud
PPT
Attaining data security in cloud computing
PPTX
Cloud Computing Security
PPTX
Security Issues in Cloud Computing
PDF
SecRBAC: Secure data in the Clouds
PPTX
data storage security technique for cloud computing
PDF
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
PPTX
Cloud Computing Security Issues
PDF
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PPT
Security Issues of Cloud Computing
PDF
G0314043
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PPTX
Security challenges of cloud computing
PPTX
Cloud Security Mechanisms
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Data security using rsa
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data integrity on cloud data storage
Security in cloud computing
Data security in the cloud
Attaining data security in cloud computing
Cloud Computing Security
Security Issues in Cloud Computing
SecRBAC: Secure data in the Clouds
data storage security technique for cloud computing
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Cloud Computing Security Issues
TWO-FACTOR DATA SECURITY PROTECTION MECHANISM FOR CLOUD STORAGE SYSTEM
Data Security Essentials for Cloud Computing - JavaOne 2013
Security Issues of Cloud Computing
G0314043
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Security challenges of cloud computing
Cloud Security Mechanisms
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Ad

Viewers also liked (20)

PPTX
CS III.1 T. Jorgensen
PPT
CyberCrime in the Cloud and How to defend Yourself
PDF
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
PPTX
Cloud Computing security Challenges for Defense Forces
PPT
Cloud computing ppt
PDF
Are you using mail policies effectively to secure your mail
PDF
Cloud computing - Risks and Mitigation - GTS
DOCX
Telenor
PDF
From byod to cyod
PPTX
Migrating To Cloud & Security @ FOBE 2011
PPTX
Cloud computing ppt
PPTX
Cloud computing
PDF
4 approaches to securing documents and email attachment assets
PDF
Email phising and spoofing hurting your business
PPTX
Cloud computing
PPTX
Cloud computing(ppt)
PPT
Assignment of trademarks
PPT
Lect15 cloud
PPTX
Cloud computing presentation
PPTX
CS III.1 T. Jorgensen
CyberCrime in the Cloud and How to defend Yourself
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Cloud Computing security Challenges for Defense Forces
Cloud computing ppt
Are you using mail policies effectively to secure your mail
Cloud computing - Risks and Mitigation - GTS
Telenor
From byod to cyod
Migrating To Cloud & Security @ FOBE 2011
Cloud computing ppt
Cloud computing
4 approaches to securing documents and email attachment assets
Email phising and spoofing hurting your business
Cloud computing
Cloud computing(ppt)
Assignment of trademarks
Lect15 cloud
Cloud computing presentation
Ad

Similar to Security Problem With Cloud Computing (20)

PPT
Cloud computing security and privacy christian goire
PPTX
Cloud computing and its security issues
PPTX
Cloud computing and data security
DOCX
UNIT -V.docx
PDF
B042306013
PDF
Various Security Issues and their Remedies in Cloud Computing
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
DOCX
Review of Business Information Systems – Fourth Quarter 2013 V.docx
PDF
How Secure Is Cloud
PPTX
Cloud computing
PPTX
Cloud computing
PDF
Ijarcet vol-2-issue-4-1405-1409
PDF
Cloud Computing Overview | Torry Harris Whitepaper
PDF
Cloud computing-overview
PDF
PDF
Ad4502189193
PDF
Trust Your Cloud Service Provider: User Based Crypto Model
PPTX
Aspects of data security
PDF
Data Privacy And Security Issues In Cloud Computing.pdf
PDF
It auditing to assure a secure cloud computing
Cloud computing security and privacy christian goire
Cloud computing and its security issues
Cloud computing and data security
UNIT -V.docx
B042306013
Various Security Issues and their Remedies in Cloud Computing
Cloud computing - Assessing the Security Risks - Jared Carstensen
Review of Business Information Systems – Fourth Quarter 2013 V.docx
How Secure Is Cloud
Cloud computing
Cloud computing
Ijarcet vol-2-issue-4-1405-1409
Cloud Computing Overview | Torry Harris Whitepaper
Cloud computing-overview
Ad4502189193
Trust Your Cloud Service Provider: User Based Crypto Model
Aspects of data security
Data Privacy And Security Issues In Cloud Computing.pdf
It auditing to assure a secure cloud computing

More from Martin Bioh (8)

PPT
Security Problem With Cloud Computing
PPT
Security Problem With Cloud Computing
PPT
Data issue affrecting Cloud computing
PPT
Security with Cloud Computing
PPT
Security Problem With Cloud Computing
PPT
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
PPT
Security Problem With Cloud Computing
PPT
CIS- 512 Assignment 4
Security Problem With Cloud Computing
Security Problem With Cloud Computing
Data issue affrecting Cloud computing
Security with Cloud Computing
Security Problem With Cloud Computing
S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G
Security Problem With Cloud Computing
CIS- 512 Assignment 4

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Basic Mud Logging Guide for educational purpose
PDF
Business Ethics Teaching Materials for college
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PPTX
Cell Structure & Organelles in detailed.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
Basic Mud Logging Guide for educational purpose
Business Ethics Teaching Materials for college
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
PPH.pptx obstetrics and gynecology in nursing
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Renaissance Architecture: A Journey from Faith to Humanism
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
Cell Structure & Organelles in detailed.
O7-L3 Supply Chain Operations - ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra

Security Problem With Cloud Computing

  • 1. MARTIN BIOH RES-531 PROF. DOUGH EARHART SECURITY ISSUES THAT AFFECT CLOUD COMPUTING DATA STORAGE
  • 2. SECURITY PROBLEM WITH CLOUD COMPUTING What is cloud computing in the first place? Cloud Computing is a metaphor for the internet “the Cloud”, Cloud computing is virtual servers available over the internet Cloud computing is also known as SaaS (Software as a Service).
  • 3. Problems with Cloud Computing Storage How do companies make informed decisions about data storage in the cloud? How do companies protect the privacy of the stored data in the cloud? How is compliance and quality controlled in the cloud?
  • 4. Purpose of My Research The purpose of this research is to examine the basic security protection method, compliance and how companies can make informed decisions and determine whether data stored in the cloud have sufficient privacy protection for customers and meet technical and regulatory issues.
  • 5. What Companies needs to know Before saving in the Cloud What service are we contracting for and what are the vendor’s records management and compliance obligations? How is information destroyed? What are the vendor’s policies for backups, replication, or failover? What is the provider’s internal audit process? Is the vendor open to being audited for compliance?
  • 6. Recommendations to Consider Before any companies contract a Cloud provider How secure is the solution you're considering Is your data available from anywhere so that you can use it as a means of disaster recovery? Does the provider have a disaster recovery plan of its own?
  • 7. CONT’ 5 Are there limits on the scalability? What happens if you grow beyond what you originally planned and contracted for?” Does the provider have a track record and enough customers to be considered stable? Is the provider's storage located in a real data center?
  • 8. Privacy and Security First among cloud computing data storage issues is security and privacy In fact, a Software as a Services (SaaS) provider may be relying on other external providers for its backbone, infrastructure, and data storage.
  • 9. Compliance Cloud computing storage places business data into the hands of an outside provider, cloud computing makes regulatory compliance inherently riskier and more complex than it is when systems are maintained in-house. Loss of direct oversight means that the client company must verify that the service provider is working to ensure that data security and integrity are ironclad.
  • 10. Compliance Cloud compliance is difficult because you do not know where you data are located. Not only does an organization not know what is being done with its data, it may not even know who the providers are. Cloud computing models ignore these problems and make compliance and verification of compliance difficult, if not impossible.
  • 11. Conclusion Cloud computing storage has become a hot term in the last few years, but a clear description of what it is, what it can do, and why companies might use it is often difficult to find Cloud computing storage may not be suitable for all businesses. Security/privacy and Compliance are a major concern.
  • 12. Cont’ Conclusion Cloud computing storage may be affordable and suitable for small businesses but certainly can not replace the traditional way of storing customer data.